Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 169

Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?

A.

Configure a single server as a primary authentication server and a second server as a secondary authentication server.

B.

Configure each authentication server as belonging to a cluster of authentication servers.

C.

Configure each authentication server and ensure that each disk of its RAID is attached to the primary controller.

D.

Configure each authentication server and ensure that the disks of each server form part of a duplex.

Full Access
Question # 170

The PRIMARY purpose of a configuration management system is to:

A.

track software updates.

B.

define baselines for software.

C.

support the release procedure.

D.

standardize change approval.

Full Access
Question # 171

Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?

A.

Time from identifying security threats to implementing solutions

B.

The number of security controls audited

C.

Time from security log capture to log analysis

D.

The number of entries in the security risk register

Full Access
Question # 172

Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?

A.

Ensure the third party allocates adequate resources to meet requirements.

B.

Use analytics within the internal audit function

C.

Conduct a capacity planning exercise

D.

Utilize performance monitoring tools to verify service level agreements (SLAs)

Full Access
Question # 173

A white box testing method is applicable with which of the following testing processes?

A.

Integration testing

B.

Parallel testing

C.

Sociability testing

D.

User acceptance testing (UAT)

Full Access
Question # 174

Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?

A.

Critical business applications

B.

Business processes

C.

Existing IT controls

D.

Recent audit results

Full Access
Question # 175

Which of the following controls is MOST effective at preventing system failures when implementing a new web application?

A.

System recovery plan

B.

System testing

C.

Business continuity plan (BCP)

D.

Transaction monitoring

Full Access
Question # 176

An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor ' s NEXT course of action?

A.

Note the exception in a new report as the item was not addressed by management.

B.

Recommend alternative solutions to address the repeat finding.

C.

Conduct a risk assessment of the repeat finding.

D.

Interview management to determine why the finding was not addressed.

Full Access
Go to page: